cve_id stringclasses 452
values | cve_published stringclasses 452
values | cve_descriptions stringclasses 450
values | cve_metrics dict | cve_references listlengths 1 64 ⌀ | cve_configurations listlengths 1 5 ⌀ | cve_primary_cwe stringclasses 33
values | cve_tags sequencelengths 1 4 ⌀ | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 8.04k ⌀ | issue_title stringlengths 1 677 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 76 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 2.89B | issue_number int64 94 131k | label bool 2
classes | issue_msg stringlengths 119 8.18k | issue_msg_n_tokens int64 119 8.18k | issue_embedding sequencelengths 3.07k 3.07k | __index_level_0__ int64 4 4.74k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-31609 | 2023-05-15T15:15:11.673 | An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | 89 | [
"Exploit",
"Issue Tracking",
"Patch"
] | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f ... | virtuoso 7.2.9 crashed at dfe_unit_col_loci | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments | 1 | 2023-04-12T18:58:35 | 2023-04-17T19:06:54Z | https://github.com/openlink/virtuoso-opensource/issues/1126 | 1,665,085,302 | 1,126 | true | This is a GitHub Issue
repo:virtuoso-opensource
owner:openlink
Title : virtuoso 7.2.9 crashed at dfe_unit_col_loci
Issue date:
--- start body ---
The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR... | 2,001 | [
-0.0009623056976124644,
0.005573991220444441,
-0.00876427348703146,
-0.003163276007398963,
0.04908569157123566,
0.026400843635201454,
-0.006690229754894972,
0.02952631004154682,
0.0016563540557399392,
0.034164100885391235,
-0.0074103837832808495,
-0.005498375277966261,
0.008490614593029022,
... | 684 |
null | null | null | null | null | null | No_CWE | null | [
"schollz",
"croc"
] | Hello. Windows 11 user. I've read the readme but the usage section doesn't help at all. What do I have to do with the croc.exe ? When I run it and paste the 3 lines to edit them in tne prompt it instantly close the window. Also when I open it it already says "enter recieve code" but I want to send a folder to someone. ... | I don't understand how to send a folder | https://api.github.com/repos/schollz/croc/issues/874/comments | 2 | 2025-01-07T20:02:53 | 2025-01-13T14:40:34Z | https://github.com/schollz/croc/issues/874 | 2,773,638,219 | 874 | false | This is a GitHub Issue
repo:croc
owner:schollz
Title : I don't understand how to send a folder
Issue date:
--- start body ---
Hello. Windows 11 user. I've read the readme but the usage section doesn't help at all. What do I have to do with the croc.exe ? When I run it and paste the 3 lines to edit them in tne prompt i... | 475 | [
-0.011878059245646,
0.006608896888792515,
-0.017651349306106567,
-0.019792161881923676,
-0.0073340111412107944,
0.006474233232438564,
0.028148239478468895,
0.058893077075481415,
-0.01484757475554943,
0.07066064327955246,
-0.014212236739695072,
-0.008977603167295456,
-0.014571340754628181,
... | 4,698 |
null | null | null | null | null | null | No_CWE | null | [
"cesanta",
"mjs"
] | "###### mJS revision\r\n\r\nCommit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830(...TRUNCATED) | SEGV src/mjs_builtin.c:21 in mjs_print | https://api.github.com/repos/cesanta/mjs/issues/225/comments | 0 | 2021-12-31T08:06:38 | 2021-12-31T08:06:38Z | https://github.com/cesanta/mjs/issues/225 | 1,091,467,053 | 225 | false | "This is a GitHub Issue\nrepo:mjs\nowner:cesanta\nTitle : SEGV src/mjs_builtin.c:21 in mjs_print\nIs(...TRUNCATED) | 1,302 | [0.009575335308909416,-0.0010269564809277654,0.001686115050688386,0.014071641489863396,0.03666108846(...TRUNCATED) | 3,489 |
CVE-2024-24267 | 2024-02-05T18:15:52.427 | "gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_fro(...TRUNCATED) | {"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED) | [{"source":"cve@mitre.org","tags":null,"url":"https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"81F(...TRUNCATED) | 401 | null | [
"gpac",
"gpac"
] | "Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b7(...TRUNCATED) | Memory leak in function gf_fileio_from_mem | https://api.github.com/repos/gpac/gpac/issues/2571/comments | 0 | 2023-08-29T11:13:38 | 2023-08-29T13:47:19Z | https://github.com/gpac/gpac/issues/2571 | 1,871,446,973 | 2,571 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Memory leak in function gf_fileio_from_mem\n(...TRUNCATED) | 757 | [-0.04661935567855835,0.01252696942538023,-0.014278438873589039,-0.03534652292728424,-0.002764150034(...TRUNCATED) | 843 |
CVE-2020-23306 | 2021-06-10T23:15:07.810 | There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0. | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"url":(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*","matchCr(...TRUNCATED) | 787 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | [
"jerryscript-project",
"jerryscript"
] | "###### JerryScript revision\r\nbd1c4df\r\n\r\n###### Build platform\r\nUbuntu 16.04.6 LTS (Linux 4.(...TRUNCATED) | stack-overflow in ecma_regexp_match | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3753/comments | 6 | 2020-05-18T05:18:42 | 2020-05-26T13:29:29Z | https://github.com/jerryscript-project/jerryscript/issues/3753 | 619,915,696 | 3,753 | true | "This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : stack-overflow in ecma(...TRUNCATED) | 2,063 | [-0.02298366278409958,0.008875575847923756,-0.002535376464948058,0.00746195437386632,0.0073001966811(...TRUNCATED) | 238 |
CVE-2017-12806 | 2019-05-09T16:29:00.373 | "In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, whi(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":null,"url":"http://lists.opensuse.org/opensuse-security-announce/2(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*","match(...TRUNCATED) | 400 | [
"Exploit",
"Third Party Advisory"
] | [
"ImageMagick",
"ImageMagick"
] | "```\r\nroot@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null\r\n==8638==ERROR: AddressSan(...TRUNCATED) | memory exhaustion in format8BIM | https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments | 2 | 2017-08-08T03:28:18 | 2019-05-10T01:41:26Z | https://github.com/ImageMagick/ImageMagick/issues/660 | 248,590,588 | 660 | true | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : memory exhaustion in format8BI(...TRUNCATED) | 5,598 | [-0.03249456733465195,0.013010197319090366,0.00020500253594946116,0.0021065110340714455,0.0359034724(...TRUNCATED) | 39 |
null | null | null | null | null | null | No_CWE | null | [
"emqx",
"nanomq"
] | "**Describe the bug**\r\n我需要使用MQTTNet客户端发送超大的消息,消息Payload是经(...TRUNCATED) | MQTTNet: client didnt receive 17mb size big msg | https://api.github.com/repos/nanomq/nanomq/issues/1954/comments | 1 | 2024-12-08T03:48:02 | 2024-12-09T04:34:02Z | https://github.com/nanomq/nanomq/issues/1954 | 2,724,934,652 | 1,954 | false | "This is a GitHub Issue\nrepo:nanomq\nowner:emqx\nTitle : MQTTNet: client didnt receive 17mb size bi(...TRUNCATED) | 3,867 | [-0.027407975867390633,0.011029104702174664,-0.0033493528608232737,0.013152149505913258,0.0355016067(...TRUNCATED) | 4,313 |
null | null | null | null | null | null | No_CWE | null | [
"gpac",
"gpac"
] | "## Description\r\nThere is a heap-buffer-overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED) | There is a heap-buffer-overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2065/comments | 1 | 2022-01-26T04:22:40 | 2022-01-27T10:41:15Z | https://github.com/gpac/gpac/issues/2065 | 1,114,614,296 | 2,065 | false | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap-buffer-overflow detected by (...TRUNCATED) | 5,127 | [-0.040920455008745193,0.02490301989018917,-0.011947311460971832,0.013211460784077644,0.034899301826(...TRUNCATED) | 1,664 |
null | null | null | null | null | null | No_CWE | null | [
"Piwigo",
"Piwigo"
] | The email that is sent is currently in the language of the administrator sending it. | [users] wrong language when generating password email | https://api.github.com/repos/Piwigo/Piwigo/issues/2287/comments | 0 | 2024-12-04T13:13:30 | 2024-12-04T14:08:08Z | https://github.com/Piwigo/Piwigo/issues/2287 | 2,717,703,452 | 2,287 | false | "This is a GitHub Issue\nrepo:Piwigo\nowner:Piwigo\nTitle : [users] wrong language when generating p(...TRUNCATED) | 245 | [-0.017018616199493408,0.014563876204192638,-0.00430265162140131,0.0026141609996557236,0.02921003289(...TRUNCATED) | 3,790 |
CVE-2023-37766 | 2023-07-11T23:15:09.210 | "GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf(...TRUNCATED) | {"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"],"url":"https://github.com/gpac/gpac/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:(...TRUNCATED) | 787 | [
"Exploit",
"Vendor Advisory"
] | [
"gpac",
"gpac"
] | "Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.\r\nThe following is the detai(...TRUNCATED) | SEGV on unknown address 0x000000000038 | https://api.github.com/repos/gpac/gpac/issues/2516/comments | 0 | 2023-07-04T13:14:59 | 2023-07-04T15:06:27Z | https://github.com/gpac/gpac/issues/2516 | 1,787,914,764 | 2,516 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : SEGV on unknown address 0x000000000038\nIssu(...TRUNCATED) | 2,576 | [-0.02695433981716633,0.014355783350765705,-0.00030584351043216884,0.009909234009683132,0.0181070808(...TRUNCATED) | 758 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 2